Exploring varieties of cyber operational engagements
Red teaming in the cybersecurity space frequently focuses on infrastructure attacks, performing lateral movement through Windows environments.
Operations focus on this because Windows is still the most dominant infrastructure in most organizations. The risks and the problem space are pretty well understood. There is also very mature, good tooling available (such as PowerShell Empire, PingCastle, and Bloodhound, to name just a few highlights) and it is fun to perform for penetration testers and quite impactful.
The outstanding research and knowledge sharing that's done by the security community, pen testers, and red teamers has led to a better understanding of threats and attacks and has led to stronger defenses and improvements in detection, tooling, and processes.
It started long back by adding mitigations such as stack cookies, and decades later the security community and researchers kept pushing the envelope....